SlideShare a Scribd company logo
The 3rd Asian Conference on Machine Learning,
ACML2011            Taoyuan, Taiwan, November, 13-15, 2011




     Support vector machines under
         adversarial label noise

             Battista Biggio1, Blaine Nelson2, Pavel Laskov2



           (1) Pattern Recognition and Applications Group
 PRA
  group    Department of Electrical and Electronic Engineering (DIEE)
           University of Cagliari, Italy



           (2) Cognitive Systems Group
Reactive   WilhelmUniversity of Institute for Computer Science
                    Schickard
Security   University of Tuebingen, Germany
                   Cagliari
Outline

• Adversarial classification
• Our work
     – Attacking SVMs
     – Label Noise robust SVM
• Experiments
• Conclusions




             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   2
Adversarial classification
•   Pattern recognition in security applications
      – spam filtering, intrusion detection, biometrics




     x2                                                                    legitimate
                f(x)                                                       malicious




                                                              x1
               University of
               Cagliari

13-11-2011             SVMs under adv ersarial label noise - B. Nelson - ACML2011       3
Adversarial classification
•   Pattern recognition in security applications
      – spam filtering, intrusion detection, biometrics
•   Malicious adversaries aim to mislead the system


     x2                                                                    legitimate
                f(x)                                                       malicious


                                                         Buy viagra!




                                               Buy vi4gr@!

                                                              x1
               University of
               Cagliari

13-11-2011             SVMs under adv ersarial label noise - B. Nelson - ACML2011       4
Open issues

1. Vulnerability identification

2. Security evaluation of pattern classifiers

3. Design of secure pattern classifiers




             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   5
A taxonomy of potential attacks
  against machine learning systems
                 Causative (TR) / Exploratory (TS)




                                  Influence                  M. Barreno, B. Nelson, A. Joseph, and J.
                                                             Tygar. The security of machine learning.
                                                             Machine Learning, 81:121–148, 2010.




              Security violation           Specificity


Integrity (FN) / Availability (FP+FN)             Targeted / Indiscriminate



                  University of
                  Cagliari

 13-11-2011              SVMs under adv ersarial label noise - B. Nelson - ACML2011           6
Attacking SVMs
                                   adversarial label flips

•     Support vector machines                            •   Label flips
     f (x;w,b) = sign(w! x + b) !{"1, +1}                      – Max. classification error
                                                         •   Heuristic strategy
           1                                                   – Flip labels of samples
     min # !Q# " 1! #  n                                         which are farthest from
       # 2
                                                                 the hyperplane (high loss)
     s. t. 0 $ # i $ C, i = 1,…, n,
           n                                                   – Correlated label flips
          %# y   i i   = 0, where Q = K ! yy! .
          i =1


                                        n
    Solution is sparse!         w = " ! i yi xi
                                       i =1




                       University of
                       Cagliari

13-11-2011                    SVMs under adv ersarial label noise - B. Nelson - ACML2011     7
Label Noise (LN) robust SVMs
•   Label flip yi ' = !yi " yi ' = yi (1 ! 2# i ), # i ${0,1}
•   Kernel matrix becomes
                     Qij = yi y j K(xi , x j )(1 ! 2" i )(1 ! 2" j )

•   To be less sensitive to label flips, we learn an SVM using the
    expected kernel matrix
     – random noise (ε iid r.v.)

                           % yi y j K(xi , x j )(1 " 4# 2 ), if i $ j,
                           '
              E ! [Qij ] = &
                           ' yi y j K(xi , x j ),
                           (                             otherwise,
              where # 2 = µ (1 " µ ).

              University of
              Cagliari

13-11-2011           SVMs under adv ersarial label noise - B. Nelson - ACML2011   8
Label Noise (LN) robust SVMs

• Pros
     – Kernel correction
     – Convex QP problem


• Cons
     – Parameter selection µ
     – Heuristic approach (not guaranteed to be optimal)




             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   9
A simple example




                 SVM                                      LN-robust SVM

• Weights are more spread among training points
• Solution is less sparse (but more robust)



             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   10
Experiments
•   SVM with linear kernel
     – similar results with RBF kernel
•   7 UCI data sets
     – australian, breast-cancer, diabetes, fourclass, heart,
       ionosphere, sonar
•   Attack strategies
     – adversarial label flips
     – random label flips
•   Classification error is evaluated on a (untainted) testing
    set w.r.t. the percentage of flipped labels in training data




              University of
              Cagliari

13-11-2011           SVMs under adv ersarial label noise - B. Nelson - ACML2011   11
Experimental results
             adversarial label flips                                    random label flips




                   University of
                   Cagliari

13-11-2011                SVMs under adv ersarial label noise - B. Nelson - ACML2011         12
Conclusions and future work

• Accuracy vs robustness trade-off
     – Guidelines for parameter selection (µ)


• Investigation of properties of the proposed
  kernel correction
     – Weight equalization
     – Modified loss function




             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   13
Thank you!



                                      ?
Battista Biggio battista.biggio@diee.unica.it
Blaine Nelson blaine.nelson@wsii.uni-tuebingen.de
 Pavel Laskov pavel.laskov@uni-tuebingen.de




     University of
     Cagliari
Backup slides




University of
Cagliari
Results: adversarial label flips




             University of
             Cagliari

13-11-2011          SVMs under adv ersarial label noise - B. Nelson - ACML2011   16
Results: random label flips




               University of
               Cagliari

13-11-2011            SVMs under adv ersarial label noise - B. Nelson - ACML2011   17

More Related Content

Viewers also liked

Machine Learning Workshop
Machine Learning WorkshopMachine Learning Workshop
Machine Learning Workshop
Osman Ramadan
 
SVM for Regression
SVM for RegressionSVM for Regression
SVM for Regression
trieuminhtien
 
Predicting Stock Market Price Using Support Vector Regression
Predicting Stock Market Price Using Support Vector RegressionPredicting Stock Market Price Using Support Vector Regression
Predicting Stock Market Price Using Support Vector Regression
Chittagong Independent University
 
Support vector regression and its application in trading
Support vector regression and its application in tradingSupport vector regression and its application in trading
Support vector regression and its application in trading
Aashay Harlalka
 
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methodsData Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
Salah Amean
 
Support Vector Machines for Classification
Support Vector Machines for ClassificationSupport Vector Machines for Classification
Support Vector Machines for Classification
Prakash Pimpale
 

Viewers also liked (6)

Machine Learning Workshop
Machine Learning WorkshopMachine Learning Workshop
Machine Learning Workshop
 
SVM for Regression
SVM for RegressionSVM for Regression
SVM for Regression
 
Predicting Stock Market Price Using Support Vector Regression
Predicting Stock Market Price Using Support Vector RegressionPredicting Stock Market Price Using Support Vector Regression
Predicting Stock Market Price Using Support Vector Regression
 
Support vector regression and its application in trading
Support vector regression and its application in tradingSupport vector regression and its application in trading
Support vector regression and its application in trading
 
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methodsData Mining: Concepts and techniques classification _chapter 9 :advanced methods
Data Mining: Concepts and techniques classification _chapter 9 :advanced methods
 
Support Vector Machines for Classification
Support Vector Machines for ClassificationSupport Vector Machines for Classification
Support Vector Machines for Classification
 

More from Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
Pluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
Pluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Pluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
Pluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
Pluribus One
 

More from Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista Biggio

  • 1. The 3rd Asian Conference on Machine Learning, ACML2011 Taoyuan, Taiwan, November, 13-15, 2011 Support vector machines under adversarial label noise Battista Biggio1, Blaine Nelson2, Pavel Laskov2 (1) Pattern Recognition and Applications Group PRA group Department of Electrical and Electronic Engineering (DIEE) University of Cagliari, Italy (2) Cognitive Systems Group Reactive WilhelmUniversity of Institute for Computer Science Schickard Security University of Tuebingen, Germany Cagliari
  • 2. Outline • Adversarial classification • Our work – Attacking SVMs – Label Noise robust SVM • Experiments • Conclusions University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 2
  • 3. Adversarial classification • Pattern recognition in security applications – spam filtering, intrusion detection, biometrics x2 legitimate f(x) malicious x1 University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 3
  • 4. Adversarial classification • Pattern recognition in security applications – spam filtering, intrusion detection, biometrics • Malicious adversaries aim to mislead the system x2 legitimate f(x) malicious Buy viagra! Buy vi4gr@! x1 University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 4
  • 5. Open issues 1. Vulnerability identification 2. Security evaluation of pattern classifiers 3. Design of secure pattern classifiers University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 5
  • 6. A taxonomy of potential attacks against machine learning systems Causative (TR) / Exploratory (TS) Influence M. Barreno, B. Nelson, A. Joseph, and J. Tygar. The security of machine learning. Machine Learning, 81:121–148, 2010. Security violation Specificity Integrity (FN) / Availability (FP+FN) Targeted / Indiscriminate University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 6
  • 7. Attacking SVMs adversarial label flips • Support vector machines • Label flips f (x;w,b) = sign(w! x + b) !{"1, +1} – Max. classification error • Heuristic strategy 1 – Flip labels of samples min # !Q# " 1! # n which are farthest from # 2 the hyperplane (high loss) s. t. 0 $ # i $ C, i = 1,…, n, n – Correlated label flips %# y i i = 0, where Q = K ! yy! . i =1 n Solution is sparse! w = " ! i yi xi i =1 University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 7
  • 8. Label Noise (LN) robust SVMs • Label flip yi ' = !yi " yi ' = yi (1 ! 2# i ), # i ${0,1} • Kernel matrix becomes Qij = yi y j K(xi , x j )(1 ! 2" i )(1 ! 2" j ) • To be less sensitive to label flips, we learn an SVM using the expected kernel matrix – random noise (ε iid r.v.) % yi y j K(xi , x j )(1 " 4# 2 ), if i $ j, ' E ! [Qij ] = & ' yi y j K(xi , x j ), ( otherwise, where # 2 = µ (1 " µ ). University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 8
  • 9. Label Noise (LN) robust SVMs • Pros – Kernel correction – Convex QP problem • Cons – Parameter selection µ – Heuristic approach (not guaranteed to be optimal) University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 9
  • 10. A simple example SVM LN-robust SVM • Weights are more spread among training points • Solution is less sparse (but more robust) University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 10
  • 11. Experiments • SVM with linear kernel – similar results with RBF kernel • 7 UCI data sets – australian, breast-cancer, diabetes, fourclass, heart, ionosphere, sonar • Attack strategies – adversarial label flips – random label flips • Classification error is evaluated on a (untainted) testing set w.r.t. the percentage of flipped labels in training data University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 11
  • 12. Experimental results adversarial label flips random label flips University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 12
  • 13. Conclusions and future work • Accuracy vs robustness trade-off – Guidelines for parameter selection (µ) • Investigation of properties of the proposed kernel correction – Weight equalization – Modified loss function University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 13
  • 14. Thank you! ? Battista Biggio battista.biggio@diee.unica.it Blaine Nelson blaine.nelson@wsii.uni-tuebingen.de Pavel Laskov pavel.laskov@uni-tuebingen.de University of Cagliari
  • 16. Results: adversarial label flips University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 16
  • 17. Results: random label flips University of Cagliari 13-11-2011 SVMs under adv ersarial label noise - B. Nelson - ACML2011 17